Exploitation Tools

JYso – A Comprehensive Guide To Advanced JNDI And Serialization Exploits

JYso is a tool that can be used as both ysoserial and JNDIExploit. It also has bypass functions of multiple JNDI…

3 months ago

Findsploit – The Ultimate Tool For Exploit Discovery And Management

Finsploit is a simple bash script to quickly and easily search both local and online exploit databases. This repository also…

3 months ago

CVE-2024-38077-EXP : In-Depth Analysis And Exploitation Of A Windows Server 2025 Vulnerability

We delve into CVE-2024-38077, a critical security vulnerability identified in Windows Server 2025. This flaw, if exploited, could allow unauthorized…

3 months ago

TrickDump – Evading Detection With Advanced Memory Dump Techniques

TrickDump dumps the lsass process without creating a Minidump file, generating instead 3 JSON and 1 ZIP file with the…

3 months ago

DriverJack – Exploiting NTFS Techniques For Covert Driver Loading

DriverJack is a tool designed to load a vulnerable driver by abusing lesser-known NTFS techniques. These method bypass the registration of…

3 months ago

SCCM HTTP Looter – A Deep Dive Into Exploiting Microsoft SCCM via HTTP

SCCM distribution points (DPs) are the servers used by Microsoft SCCM to host all the files used in software installs,…

3 months ago

Metasploit for Penetration Testing and Exploitation – 2024

Metasploit is a powerful and widely used framework for penetration testing and exploitation. It provides security professionals with tools to…

4 months ago

Pentesting Active Directory – A Comprehensive Guide To Tools, Techniques, And Commands

This is a cheatsheet of tools and commands that I use to pentest Active Directory. It includes Windows, Impacket and…

4 months ago

Contributing Your Work – A Guide To Submitting Exploits On GitHub

To contribute your work to the project you need to create a pull request on the Github where it is…

4 months ago

Adding An Exploit – How To Integrate And Manage New Exploits In BlueToolkit

To add an exploit one has to go through a similar process as with the hardware profile, but in the…

4 months ago